Diversity Is Key To Combating Gen-AI Hackers

This year, a Hong Kong business fell victim to a sophisticated cyber attack, losing $25 million after an employee was deceived by a deepfake video call impersonating their CFO. This incident highlights just how much generative AI (genAI) is changing the complexity of cyber attacks. 

While not all threats reach this level of sophistication, the Brirish  National Cyber Security Centre warns that AI is increasingly being used by a range of threat actors including state or non-state, highly skilled or even less experienced.

The adoption of AI in cyber attacks is reshaping the threat landscape, making vigilance and innovation in defence more critical than ever. 

Balancing Threats & Opportunities 

GenAI is creating a dynamic and challenging threat landscape for cyber teams. Issues such as misinformation and deep fakes are becoming more common, complicating efforts to protect organisations. As genAI tools become more widely integrated into workplaces, data protection has emerged as a critical concern, particularly for organisations using open-source AI tools. These developments demand more robust strategies to mitigate risks effectively. 

However, it’s not just the criminals using genAI to their advantage. Cyber leaders are harnessing the technology to identify weaknesses in their attack surfaces and to improve their detection and triaging of attacks and malicious campaigns. 

They’re also getting on the front foot by establishing clear policies on the appropriate uses of AI in the workplace and prioritising training in AI literacy and safety for employees so security risks can be avoided. This can include the workforce not falling foul to voice clones or using insecure third-party chatbots that may give attackers unauthorised access to networks. 

The Importance Of The Makeup Of A Cyber Team 

Adapting technologies and policies to address the emerging threat landscape shaped by the rise of genAI is crucial. But this alone will not be enough to battle AI-armed hackers. Just as important is the makeup of a cyber team itself. Why? While the AI threat may be digital, its driver is human. That means you need people who can get into the minds of hackers. To understand them. And, to outthink them. 

Diversity is key to this. Teams must be formed of people from different backgrounds and who have different experiences and skill sets, so they approach AI threats in innovative ways. This will enable teams to avoid blind spots by bringing together different perspectives and critical thinking to tackle new challenges with creativity and ingenuity. 

The Issue With Traditional Hiring Routes 

If you work in cyber, though, you’ll already know that many teams aren’t diverse. Sometimes this is down to the broader issue of the UK skills gap, given 30% of cyber firms in the UK say they have faced a problem with a technical skills gap. We also know that a catalyst for this skills gap is a grassroots issue that inhibits more diverse representation into this traditionally white male-dominated career path.  

It is also a hiring issue. When a cyber role is advertised, you’ll see heavy emphasis placed on the candidate having completed a relevant degree and even for an entry-level position, having some level of industry experience (sometimes three years!). 

Continuing in this vein means that hiring managers risk narrowing the talent pool and continuing to hire the same ‘cookie cutter’ version of what they think is an ideal cyber security employee. The homogeneity of a traditional cyber team, made up mostly of white, middle-class men can jeopardise an organisation’s security.

With a host of similar worldviews, these teams may lack the diversity of skills and ideas to tackle rising genAI threats and get into the minds of hackers.   

The Industry’s Need For Impact Skills 

The hiring process is a place where a lot of this progressive change can happen. Ensuring hiring managers are prioritising skills and experience over qualifications can help encourage career changers and those from non-traditional cyber routes into the industry. By prioritising these types of candidates, cyber leaders can bring unique insights into how cyber threats impact different business areas. 

Organisations are often well-versed in placing experienced hires, graduates or apprentices. However, they often lack a defined path for experienced professionals with new cyber skills. For example, project managers transitioning to cyber project managers often don’t fit into predefined hiring categories.

By opening these paths, organisations can leverage the experience of individuals who can apply their knowledge to cyber-specific challenges.

This approach also means the hiring focus does not solely focus on individuals with advanced technical skills, aligning with the outdated perception that only individuals equipped with this will succeed. In reality, those skills are often the easiest to teach and continuous technical training is needed, regardless, because of the new threats emerging thanks to genAI and other technologies. What the industry needs is impact skills, which range from creativity and problem-solving to critical thinking, which aid teams to get into the minds of the hackers using genAI. 

Breaking Down Barriers 

Addressing the risks posed by genAI in cyber security demands removing barriers to professional education and expanding access to the field. The UK’s cyber security workforce faces a critical skills shortage, limiting its ability to identify and mitigate threats effectively. To close this gap, hiring practices should prioritise candidates with diverse skills and non-traditional backgrounds, broadening the talent pool. 

By assembling teams with diverse perspectives and expertise, organisations can not only mitigate AI-related cyber risks but also innovate and gain a competitive edge in the digital age.

Dr. Andrea Cullen is CEO &  Co-Founder of CAPSLOCK

Image: Ideogram

You Might Also Read: 

One Third Of Cyber Criminals Are Women:  


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« British Spy Agency Opens A New Cyber Centre
The Corporate CISO Role Is Evolving  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.